Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | David Aucsmith (eds.) |
Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![Springer, 3-540-65386-4 The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depovere |
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 329-343, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Dogan Kesdogan, Jan Egner, Roland Büschkes |
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 83-98, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Juan Ramón Hernández, Fernando Pérez-González |
Shedding More Light on Image Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 191-207, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Ross J. Anderson, Roger M. Needham, Adi Shamir |
The Steganographic File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 73-82, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Christian Neubauer, Jürgen Herre, Karlheinz Brandenburg |
Continuous Steganographic Data Transmission Using Uncompressed Audio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 208-217, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Jack Lacy, Schuyler R. Quackenbush, Amy R. Reibman, James H. Snyder |
Intellectual Property Protection Systems and Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 158-168, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Sabrina Sowers, Abdou Youssef |
Testing Digital Watermark Resistance to Destruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 239-257, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Mark Ettinger |
Steganalysis and Game Equilibria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 319-328, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Active Warden Attack, Cryptanalysis, Steganalysis, Shannon Entropy, Equilibria, Binary Symmetric Channel |
23 | Andreas Westfeld, Gritta Wolf |
Steganography in a Video Conferencing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 32-47, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Scott Craver |
On Public-Key Steganography in the Presence of an Active Warden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 355-368, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Neil F. Johnson 0001, Sushil Jajodia |
Steganalysis of Images Created Using Current Steganography Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 273-289, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Jan Zöllner 0002, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf |
Modeling the Security of Steganographic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 344-354, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Security and modeling of steganography, indeterminism, secret communication, hidden communication, entropy |
23 | Maurice Maes |
Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 290-305, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | John C. Lach, William H. Mangione-Smith, Miodrag Potkonjak |
Fingerprinting Digital Circuits on Programmable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 16-31, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Alexander Herrigel, Joseph Ó Ruanaidh, Holger Petersen 0001, Shelby Pereira, Thierry Pun |
Secure Copyright Protection Techniques for Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 169-190, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Markus G. Kuhn, Ross J. Anderson |
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 124-142, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Jiri Fridrich, Arnold C. Baldoza, Richard J. Simard |
Robust Digital Watermarking Based on Key-Dependent Basis Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 143-157, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Robust image watermarking, orthogonal patterns, secure public watermark detector, attacks |
23 | Jean-Paul M. G. Linnartz, Marten van Dijk |
Analysis of the Sensitivity Attack against Electronic Watermarks in Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 258-272, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Gerrit Bleumer |
Biometric yet Privacy Protecting Person Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 99-110, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs |
23 | Ross J. Anderson (eds.) |
Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![Springer, 3-540-61996-8 The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Jack Brassil, Lawrence O'Gorman |
Watermarking Document Images with Bounding Box Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 227-235, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Ross J. Anderson |
Stretching the Limits of Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 39-48, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung |
A Progress Report on Subliminal-Free Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 157-168, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Thomas A. Berson |
HMOS: Her Mayesty's Orthography Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 345, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Kouichi Sakurai, Yoshinori Yamane |
Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 257-264, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Mark S. Anderson 0001, Maris A. Ozols |
Covert Channel Analysis for Stubs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 95-113, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Elke Franz 0001, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand |
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 7-21, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Birgit Pfitzmann |
Trials of Traced Traitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 49-64, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Gustavus J. Simmons |
The History of Subliminal Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 237-256, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg |
The Newton Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 151-156, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | David Aucsmith |
Tamper Resistant Software: An Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 317-333, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Steven H. Low, Nicholas F. Maxemchuk |
Modeling Cryptographic Protocols and Their Collusion Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 169-184, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | David Kahn |
The History of Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 1-5, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Yvo Desmedt |
Establishing Big Broth Using Covert Channals and Other Covert Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 65-71, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Hannes Federrath, Anja Jerichow, Andreas Pfitzmann |
MIXes in Mobile Communication Systems: Location Management with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 121-135, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Tuomas Aura |
Practical Invisibility in Digital Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 265-278, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Catherine Meadows 0001, Ira S. Moskowitz |
Covert Channels - A Context-Based View. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 73-93, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Ingemar J. Cox, Joe Kilian, Frank Thomson Leighton, Talal Shamoon |
A Secure, Robust Watermark for Multimedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 185-206, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Matt Blaze |
Oblevious Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 335-343, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Paul Davern, Michael Scott |
Fractal Based Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 279-294, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Ian W. Jackson |
Anonymous Addresses and Confidentiality of Location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings, pp. 115-120, 1996, Springer, 3-540-61996-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | ShaoWei Weng, Yao Zhao 0001, Rongrong Ni, Jeng-Shyang Pan 0001 |
Lossless data hiding based on prediction-error adjustment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(2), pp. 269-275, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PEA, prediction, reversible watermarking |
23 | Zongyang Zhang, Zhenfu Cao, Ning Ding 0001, Rong Ma |
Non-malleable Statistically Hiding Commitment from Any One-Way Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 303-318, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Osman Abul |
MotifHider: A knowledge hiding approach to sequence masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: The 24th International Symposium on Computer and Information Sciences, ISCIS 2009, 14-16 September 2009, North Cyprus, pp. 171-176, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Niladri B. Puhan, Anthony Tung Shuen Ho, Farook Sattar |
High Capacity Data Hiding in Binary Document Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 149-161, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | François Cayre, Patrick Bas |
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(1), pp. 1-15, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Sanghyun Park, Aviral Shrivastava, Yunheung Paek |
Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008, pp. 1190-1195, 2008, ACM, 978-3-9810801-3-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ruey-Ming Chao, Yu-An Ho, Yen-Ping Chu |
Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1483-1488, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Andreas Pashalidis |
Measuring the Effectiveness and the Fairness of Relation Hiding Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1387-1394, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda |
Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 19th International Conference on Pattern Recognition (ICPR 2008), December 8-11, 2008, Tampa, Florida, USA, pp. 1-4, 2008, IEEE Computer Society, 978-1-4244-2175-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yin-Cheng Qi, Hui Wang, Jin-Sha Yuan |
Speech Information Hiding Method Based on Itakura-Saito Measure and Psychoacoustic Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1739-1742, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yu-Jie Chang, Ja-Chen Lin |
Data hiding using VQ index file. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 230-232, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Romain Beauxis, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Prakash Panangaden |
Formal Approaches to Information-Hiding (Tutorial). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 347-362, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Masaaki Fujiyoshi, Shuji Sato, Hong Lin Jin, Hitoshi Kiya |
A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 257-260, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Osman Abul, Maurizio Atzori, Francesco Bonchi, Fosca Giannotti |
Hiding Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pp. 147-156, 2007, IEEE Computer Society, 978-1-4244-0831-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yousof Erfani, Mohammad Shahram Moin, Mehdi Parviz |
New Methods for Transparent and Accurate Echo Hiding By Using the Original Audio Cepstral Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 1087-1092, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev 0001 |
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 669-679, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Bo Xu, Jiazhen Wang, Deyun Peng |
Practical Protocol Steganography: Hiding Data in IP Header. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: First Asia International Conference on Modelling and Simulation, AMS 2007, Phuket, Thailand, March 27-30, 2007, pp. 584-588, 2007, IEEE Computer Society, 978-0-7695-2845-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Grigorios Chrysos 0001, Apostolos Dollas, Nikolaos G. Bourbakis, J. Sukarno Mertoguno |
An Integrated Video Compression, Encryption and Information Hiding Architecture based on the SCAN Algorithm and the Stretch Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA, pp. 327-330, 2007, IEEE Computer Society, 0-7695-2940-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Tianding Chen |
A Novel Biology-Based Reversible Data Hiding Fusion Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FAW ![In: Frontiers in Algorithmics, First Annual International Workshop, FAW 2007, Lanzhou, China, August 1-3, 2007, Proceedings, pp. 84-95, 2007, Springer, 978-3-540-73813-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhe-Ming Lu, Zhen Li |
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 233-243, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Huijuan Yang, Alex C. Kot, Susanto Rahardja, Xudong Jiang 0001 |
High Capacity Data Hiding for Binary Images in Morphological Wavelet Transform Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1239-1242, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Huijuan Yang, Alex C. Kot |
Data Hiding For Binary Images Authentication By Considering A Larger Neighborhood. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 1269-1272, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Gary T. Leavens, Peter Müller 0001 |
Information Hiding and Visibility in Interface Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, pp. 385-395, 2007, IEEE Computer Society, 0-7695-2828-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Sung-Min Kim, Sang Beom Kim, Youpyo Hong, Chee Sun Won |
Data Hiding on H.264/AVC Compressed Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, 4th International Conference, ICIAR 2007, Montreal, Canada, August 22-24, 2007, Proceedings, pp. 698-707, 2007, Springer, 978-3-540-74258-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Soo-Chang Pei, Jing-Ming Guo |
High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(6), pp. 1665-1679, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Haohong Wang, Sotirios A. Tsaftaris, Aggelos K. Katsaggelos |
Joint source-channel coding for wireless object-based video communications utilizing data hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(8), pp. 2158-2169, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Qin Ma 0002, Luc Maranget |
Information Hiding in the Join Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 240-247, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ding-Yu Fang, Long-Wen Chang |
Data hiding for digital video with phase of motion vector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Deng Lixin |
A new approach of data hiding within speech based on Hash and Hilbert Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 13, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yu-Ming Cheng, Chung-Ming Wang, Yuan-Yu Tsai |
A Data Hiding Algorithm for Point-Sampled Geometry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I, pp. 181-191, 2006, Springer, 3-540-34070-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Chin-Chen Chang 0001, Wen-Chuan Wu 0002 |
A novel data hiding scheme for keeping high stego-image quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM ![In: 12th International Conference on Multi Media Modeling (MMM 2006), 4-6 January 2006, Beijing, China, 2006, IEEE, 1-4244-0028-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ahmad Movahedian Attar, Omid Taheri, Saeed Sadri, Rasoul Amir Fattahi |
Data Hiding in Halftone Images using Error Diffusion Halftoning with Adaptive Thresholding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 2029-2032, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Chun-Hsien Chou, Kuo-Cheng Liu |
Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 651-654, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Chowdary Adsumilli, Mylène Christine Queiroz de Farias, Sanjit K. Mitra, Marco Carli |
A robust error concealment technique using data hiding for image and video transmission over lossy channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 15(11), pp. 1394-1406, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun |
Asymmetric spread spectrum data-hiding for Laplacian host data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 217-220, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Xingzhi Sun, Philip S. Yu |
A Border-Based Approach for Hiding Sensitive Frequent Itemsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA, pp. 426-433, 2005, IEEE Computer Society, 0-7695-2278-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Mingqiao Wu, Zhongliang Zhu, Shiyao Jin |
Detection of Hiding in the LSB of DCT Coefficients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I, pp. 291-300, 2005, Springer, 3-540-28226-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Chin-Chen Chang 0001, Wen-Chuan Wu 0002 |
A Reversible Information Hiding Scheme Based on Vector Quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 1101-1107, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Wei-Soul Li, Wen-Shyong Hsieh, Ming-Hong Sun |
Index LOCO-I: A Hybrid Method of Data Hiding and Image Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 463-468, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jiangtao Li 0001, Ninghui Li |
Policy-hiding access control in open environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 29-38, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials |
23 | Shyue-Liang Wang, Ayat Jafari |
Using unknowns for hiding sensitive predictive association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, August 15-17, 2005, Las Vegas Hilton, Las Vegas, NV, USA, pp. 223-228, 2005, IEEE Systems, Man, and Cybernetics Society, 0-7803-9093-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Chin-Chen Chang 0001, Wei-Liang Tai, Chia-Chen Lin 0001 |
Secret Hiding Using Side Match Vector Quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSTST ![In: Soft Computing as Transdisciplinary Science and Technology, Proceedings of the fourth IEEE International Workshop, WSTST'05, Muroran, Japan, pp. 172-181, 2005, Springer, 978-3-540-25055-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Minh-Triet Tran, Anh Duc Duong |
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 605-610, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Alessia De Rosa, Roberto Caldelli, Alessandro Piva |
Labelling and Authentication for Medical Imaging Through Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: From Data and Information Analysis to Knowledge Engineering, Proceedings of the 29th Annual Conference of the Gesellschaft für Klassifikation e.V., University of Magdeburg, March 9-11, 2005, pp. 638-645, 2005, Springer, 978-3-540-31313-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Hongmei Gou, Min Wu 0001 |
Data hiding in curves for collusion-resistant digital fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 51-54, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Gary Cantrell, David A. Dampier |
Experiments in hiding data inside the file structure of common office documents: a stegonography application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004, pp. 146-151, 2004, Trinity College Dublin, 1-59593-170-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Gang Xue, Peizhong Lu, Jinlian Wang |
A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers, pp. 42-54, 2004, Springer, 3-540-24839-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Shyue-Liang Wang, Yu-Huei Lee, Steve Billis, Ayat Jafari |
Hiding sensitive items in privacy preserving association rule mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3239-3244, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Pedro Comesaña, Fernando Pérez-González, Félix Balado |
Optimal Data-Hiding Strategies for Games with BER Payoffs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 101-116, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Hyon-Gon Choo, Whoi-Yul Kim |
Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 593-599, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Ming Sun Fu, Oscar C. Au |
Data hiding in halftone images by conjugate error diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (2) ![In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, Bangkok, Thailand, May 25-28, 2003, pp. 920-923, 2003, IEEE, 0-7803-7761-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Yun Q. Shi 0001, Zhicheng Ni, Nirwan Ansari, Jiwu Huang |
2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (2) ![In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, Bangkok, Thailand, May 25-28, 2003, pp. 924-927, 2003, IEEE, 0-7803-7761-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Nicholas Tran |
Hiding Functions and Computational Security of Image Watermarking Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 295-, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Ivan Damgård, Eiichiro Fujisaki |
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 125-142, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Pierre Moulin |
Information-Hiding Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers, pp. 1-12, 2002, Springer, 3-540-01217-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Ivan Damgård, Jesper Buus Nielsen |
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 581-596, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Hsi-Chun Alister Wang |
An Information Hiding Technique for Binary Images in Consideration of Printing Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2002, Third IEEE Pacific Rim Conference on Multimedia, Hsinchu, Taiwan, December 16-18, 2002, Proceedings, pp. 460-467, 2002, Springer, 3-540-00262-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Yaxiao Song, Minghao Cui, Hongxun Yao |
A High Capacity Data Hiding Scheme Based on DFT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2002, Third IEEE Pacific Rim Conference on Multimedia, Hsinchu, Taiwan, December 16-18, 2002, Proceedings, pp. 82-88, 2002, Springer, 3-540-00262-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|